Security at airports heavily depends on the utilization of sophisticated technology for identifying threats. Yet the decisions about what to do next are dependent on interpretations made by employees. Analyzing data from a field survey of airport employees across European airports, we sought to identify how trust in security technology affects the implementation of security rules and regulations. An analysis of 514 respondents from surveys in eight airports in Europe demonstrated that compliance with security rules and protocols was related to two main categories of trust in technology: one oriented to the technology itself and the other to technology as a means of catching offenders. A further multivariate analysis showed that security dec...
Abstract: This paper deals with the passenger screening procedure at airports. A survey on the accep...
Security is always a priority in the implementation of information technology solutions. The necessi...
The paper refers to the evolution of methods, new technologies, and devices in security control proc...
Security decisions in high risk organizations such as airports involve obtaining ongoing and freque...
Airport security systems are built up out of layers of defence based on the security-in-depth model ...
Recent evidence has shown that airport security decisions frequently fail to follow rules and proced...
This paper employs a behavioral science perspective of airport security to, examine security related...
This research, employing a behavioral science perspective of airport security, examinesactual securi...
The basis for effective operation in most organizations, if not all, is the administrative rules, pr...
The history of airport security shows that the security control process has been subject to substant...
Abstract. The future development of Air Traffic Management (ATM), set by the ATM 2000+ Strategy, inv...
In this paper we illustrate (a) the background and goals of the interdisciplinary research project ...
The paper refers to security requirements for new threats international airports, taking specificall...
The future development of Air Traffic Management (ATM), set by the ATM 2000+ Strategy, involves a st...
This paper deals with the passenger screening procedure at airports. A survey on the acceptability o...
Abstract: This paper deals with the passenger screening procedure at airports. A survey on the accep...
Security is always a priority in the implementation of information technology solutions. The necessi...
The paper refers to the evolution of methods, new technologies, and devices in security control proc...
Security decisions in high risk organizations such as airports involve obtaining ongoing and freque...
Airport security systems are built up out of layers of defence based on the security-in-depth model ...
Recent evidence has shown that airport security decisions frequently fail to follow rules and proced...
This paper employs a behavioral science perspective of airport security to, examine security related...
This research, employing a behavioral science perspective of airport security, examinesactual securi...
The basis for effective operation in most organizations, if not all, is the administrative rules, pr...
The history of airport security shows that the security control process has been subject to substant...
Abstract. The future development of Air Traffic Management (ATM), set by the ATM 2000+ Strategy, inv...
In this paper we illustrate (a) the background and goals of the interdisciplinary research project ...
The paper refers to security requirements for new threats international airports, taking specificall...
The future development of Air Traffic Management (ATM), set by the ATM 2000+ Strategy, involves a st...
This paper deals with the passenger screening procedure at airports. A survey on the acceptability o...
Abstract: This paper deals with the passenger screening procedure at airports. A survey on the accep...
Security is always a priority in the implementation of information technology solutions. The necessi...
The paper refers to the evolution of methods, new technologies, and devices in security control proc...